Wednesday, April 2, 2025
HomeCVE/vulnerabilitySonicOS IPSec VPN Vulnerability Let Attackers Cause Dos Condition

SonicOS IPSec VPN Vulnerability Let Attackers Cause Dos Condition

Published on

SIEM as a Service

Follow Us on Google News

SonicWall has disclosed a critical heap-based buffer overflow vulnerability in its SonicOS IPSec VPN.

This flaw, identified as CVE-2024-40764, can potentially allow unauthenticated, remote attackers to cause a Denial of Service (DoS) condition.

The vulnerability has been rated with a CVSS v3 score of 7.5, indicating a high severity level.

CVE-2024-40764: Critical Vulnerability in SonicOS IPSec VPN

The vulnerability, which affects multiple versions of SonicWall’s Gen6 and Gen7 platforms, was first published on July 17, 2024.

SonicWall has provided a workaround and is working on a patch to address this critical issue.

Advisory IDSNWLID-2024-0012
First Published2024-07-17
Last Updated2024-07-17
WorkaroundTrue
StatusApplicable
CVECVE-2024-40764
CWECWE-122
CVSS v37.5
CVSS VectorCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

The heap-based buffer overflow vulnerability in the SonicOS IPSec VPN allows an unauthenticated remote attacker to exploit the system, leading to a Denial of Service (DoS) condition.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

This could disrupt services and potentially cause significant operational downtime for affected organizations.

Affected Products

The vulnerability impacts a wide range of SonicWall products across different versions. Below is a detailed list of the affected platforms and their respective versions:

Impacted PlatformsImpacted Version
Gen6 NSv – NSv10, NSv25, NSv50, NSv100, NSv200, NSv300, NSv400, NSv800, NSv16006.5.4.4-44v-21-2395 and older versions
Gen7 – TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700, NSv 270, NSv 470, NSv 8707.0.1-5151 and older versions, 7.1.1-7051 and older versions

To mitigate the potential impact of this vulnerability, SonicWall recommends restricting inbound IPSec VPN access to trusted sources or disabling IPSec VPN access from Internet sources. This temporary measure should be implemented until the official patch is applied.

Organizations are encouraged to contact SonicWall Technical Support for further assistance restricting or disabling IPSec VPN access.

SonicWall has released fixed versions for the affected platforms. Below is a list of the fixed platforms and their respective versions:

Fixed Platforms and Versions

Fixed PlatformsFixed Version
Gen6 NSv – NSv10, NSv25, NSv50, NSv100, NSv200, NSv300, NSv400, NSv800, NSv16006.5.4.v-21s-RC2457
Gen7 – TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700, NSv 270, NSv 470, NSv 8707.0.1-5161, 7.1.1-7058, 7.1.2-7019

Organizations using SonicWall products are urged to take immediate action to mitigate the risk posed by CVE-2024-40764.

Businesses can protect their systems from potential DoS attacks by restricting or disabling IPSec VPN access and applying the necessary patches.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has...

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the...

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB),...

New Malware Targets Magic Enthusiasts to Steal Logins

A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other...